PRISM: Platform for Remote Sensing using Smart phones {Tathagata Das, Venkata N. Padmanabhan, Ramachandran Ramjee, Asankhaya Sharma } - Microsoft Research.

Slides:



Advertisements
Similar presentations
A Lightweight Platform for Integration of Mobile Devices into Pervasive Grids Stavros Isaiadis, Vladimir Getov University of Westminster, London {s.isaiadis,
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
University of Southampton Electronics and Computer Science M-grid: Using Ubiquitous Web Technologies to create a Computational Grid Robert John Walters.
IT Industry & Cloud Computing. Trends ‘2011- The year of high salaries and immense job opportunities for IT job seekers’ (Source – Blog.Timesjobs.com)
Reliability Centered Maintenance From a Data Center Perspective March 2013.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Delivering the multiagent technology to end-users through the web D. Mitrović 1, M. Ivanović 1, C. Bădică 2 1 University of Novi Sad, Serbia 2 University.
Nericell: Rich Road and Traffic Monitoring using Mobile Smartphones
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
Dynamic Tainting for Deployed Java Programs Du Li Advisor: Witawas Srisa-an University of Nebraska-Lincoln 1.
eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
New Challenges in Cloud Datacenter Monitoring and Management
Plan Introduction What is Cloud Computing?
Load Test Planning Especially with HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
SQL Server Notification Services Andy Potter Senior System Consultant SQL Server Notification Services Intellinet.
Cross Platform Mobile Backend with Mobile Services James
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
WebCall - A Rich Context Mobile Research Platform Zhigang Liu, Hawk Yin Pang, Jun Yang, Guang Yang, Peter Boda (Special thanks to August Joki) Nokia Research.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
February Semantion Privately owned, founded in 2000 First commercial implementation of OASIS ebXML Registry and Repository.
A Comparative Evaluation of HTML5 as a Pervasive Media Platform By Tom Melamed HP Ben Clayton HP Labs.
Software to Data model Lenos Vacanas, Stelios Sotiriadis, Euripides Petrakis Technical University of Crete (TUC), Greece Workshop.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
Vulnerability-Specific Execution Filtering (VSEF) for Exploit Prevention on Commodity Software Authors: James Newsome, James Newsome, David Brumley, David.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Raffaele Di Fazio Connecting to the Clouds Cloud Brokers and OCCI.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
INFSO-RI Enabling Grids for E-sciencE Logging and Bookkeeping and Job Provenance Services Ludek Matyska (CESNET) on behalf of the.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
University of Central Florida TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Written by Enck, Gilbert,
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Tathagata Das, Prashanth Mohan, Venkata N. Padmanabhan, Ramachandran Ramjee, Asankhaya Sharma.
Rick Conrad Efrain Lopez III Saeed Noori. What is Experience Sampling? Survey method People’s experiences Real-time Format Paper and Pencil Handheld devices.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Weever Apps Capabilities Overview. Over 65% of business have mobile employees.
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
IBM Bluemix Ecosystem Development Hands on Workshop Section 1 - Overview.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Efficient Software Based Fault Isolation Author: Robert Wahobe,Steven Lucco,Thomas E Anderson, Susan L Graham Presenter: Maitree kanungo Date:02/17/2010.
ROVER TECHNOLOGY PRESENTED BY Gaurav Dhuppar Final Year I.T. GUIDED BY Ms. Kavita Bhatt Lecturer I.T.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
Development of e-Science Application Portal on GAP WeiLong Ueng Academia Sinica Grid Computing
Chapter 8 – Cloud Computing
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IPS Infrastructure Technological Overview of Work Done.
VMM Based Rootkit Detection on Android
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Clouding with Microsoft Azure
PrinterOn Mobile Printing Platform
Containers as a Service with Docker to Extend an Open Platform
Distribution and components
Introduction to Cloud Computing
Azure-Powered Solution Ensures Great Precision and Clinical Accuracy for Health Monitoring Kit “Security and privacy are at the core of how we develop.
Purdue University Fort Wayne
Purdue University Fort Wayne
Running C# in the browser
From Use Cases to Implementation
Presentation transcript:

PRISM: Platform for Remote Sensing using Smart phones {Tathagata Das, Venkata N. Padmanabhan, Ramachandran Ramjee, Asankhaya Sharma } - Microsoft Research India. Prashanth Mohan- University of California, Berkeley

Overview Intro. Prism design. Software Sandbox. Implementation. Evaluation of few apps. Conclusion.

How it works ? Users Participate and contribute install prism runtime on their smart phone and register with the prism infrastructure. These phones run community sensing apps. App Server: Submits jobs to PRISM server. PRISM Server: Accepts jobs and deploy over registered mobile phones. Deployment: Apps use push or pull based model. -Push supports fast response, Efficiency, Scalability. PRISM Client: Registers and supports execution of jobs.

PRISM In a glance Balances interconnected goals of generality, security and scalability which is a challenge. Apps as executable binaries and Auto push. Supports efficiency and flexibility of reusing existing codes or modules. Push model ensures timely and scalable app ensuring good degree of privacy, controlled sensor info, safety against un-trusted apps.

Client environment API’s designed to enable the application server to accurately and quickly identify the set of mobile phones that can run the application. Accurate identification is enabled by a two-level predicate mechanism while quick deployment is enabled by a choice of deployment modes. Regulating Access to Sensors- No sensor, Only GPS, All sensors. An alternative is to place severe resource limits on PRISM applications that access sensitive sensors, instead of blocking such accesses entirely. Diminish privacy risks while providing greater flexibility compared to blocking access to sensors.

More on Prism. Sandbox environment with elements like -Resources metering -Taint and controlled access -Forced amnesia. Supports techniques such as system call interposition, virtual machine monitors, or capability-based systems.

Evaluation: Citizens Journalist PRISM to deliver the sensing task to a certain number of camera-equipped phones in the vicinity of the desired location. The location is specified by (lat, long) and includes a coarse radius for deployment and a fine radius for actual execution. If matching phones are not readily available, PRISM’s trigger mechanism is used to deploy at the location as and when PRISM clients register/send updates from the desired location.

Results

Party Thermometer: Human query app, Deploy based on location and sound sensor. Avoiding such unnecessary sensing would be essential for efficiency Conditions are that user to be stationary and involve if he is at the party. Music is done by performing FFT of audio samples and examining the spikes in frequency.

Road Bump Monitoring. Figure 6 shows the results. We find that of the 9 bumps detected by the application, 6 match bumps in the ground truth set within 12m (Figures 6(a) and (b))

Conclusion A need for such middleware Support flexibility, easing development and their deployment. Challenges can be addressed through infrastructural component and s\w sandbox. Balances 3 inter connected goals. Trading off a little privacy (i.e., allowing phones to be tracked within a registration interval), the push-based architecture of PRISM is able to achieve significant improvements in scalability

Q & A Thank you.